The user provisioning is the process of automatically creating, updating, and removing users accounts. It ensures that the users get the right access when they join, change roles, or leave the organization. To enable user provisioning, our system uses SCIM standard which provides a consistent and automated way to create, update, and deactivate users. In order to setup the user provisioning, you will have to create an identity provider following the SSO configuration instructions in this document, enable the SCIM option on it and then setup the SCIM configuration on the external identity provider.Documentation Index
Fetch the complete documentation index at: https://docs.pads4.com/llms.txt
Use this file to discover all available pages before exploring further.
1. Enable SCIM on PADS4 identity provider
While you are configuring your PADS4 identity provider, you have the possibility to enable a SCIM Provisioning option. To enable it, while creating the identity provider :- Click on “SCIM Provisioning” step
- Click “Enable SCIM Provisioning”

- SCIM URL
- SCIM Access Token
Create the provisioning configuration
- Open the application you created previously for the SSO Configuration

- Click on the “General” tab and then click on the “Edit” button from the “App settings” panel
- Check the “SCIM” option on the “Provisioning” field
- Click “Save”

- Click on the “Provisioning” tab
- Click on the “Edit” button and enter the following information :
- SCIM Connector URL – Here you will need to fill in the url that was given on the PADS4 identity provider as “SCIM URL” (e.g. https://pads4.mycompany.com /rdx/nds.services.user.scim/api/v1/scim)
- Unique identifier field for users – This will defined the unique identifier that will be the reference between Okta and PADS4. Default is “username”
- Supported provisioning actions – Click on the following actions
- Push new users
- Push profile updates
- Push groups
- Authentication Mode – Select “HTTP Header”
- HTTP Header
- Authorization – Here you will need to fill in the token that was given on the PADS4 identity provider as “SCIM Access token”
- Then click on “Test Connector Configuration” to ensure the configuration is ok

- If the test is ok, then click on the “Save” button to apply this configuration

- Click on the “To App” tab and click on the “Edit” button on the “Provisioning to App” section
- Check “Enable” checkboxes for the following sections:
- Create users
- Update user attributes
- Deactivate users
- Click on the “Save” button to apply the changes

Configure user & group mapping
The user & group mapping are already configured by default when the application is created but you can just ensure you at least have the following attributes mapped on your application:
- (Optional) Add optional attributes
| Target attribute | Comment |
|---|---|
| nfc | This property will be used to synchronize any value filled in the NFC property of PADS4 User |

